default search action
Bangdao Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Yongxin Zhang, Hong Lei, Bin Wang, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Qiuling Yue:
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme. Frontiers Comput. Sci. 18(2): 182815 (2024) - [j12]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain. IEEE Internet Things J. 11(5): 8882-8893 (2024) - [j11]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections. IEEE Open J. Comput. Soc. 5: 480-490 (2024) - [j10]Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. IEEE Trans. Inf. Forensics Secur. 19: 88-103 (2024) - [j9]Aixian Deng, Qian Ren, Yingjun Wu, Hong Lei, Bangdao Chen:
Proof of Finalization: A Self-Fulfilling Function of Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 8052-8065 (2024) - 2023
- [j8]Yongxin Zhang, Zijian Bao, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Hong Lei:
OWL: A data sharing scheme with controllable anonymity and integrity for group users. Comput. Commun. 209: 455-468 (2023) - 2022
- [j7]Qinghao Wang, Yongxin Zhang, Zijian Bao, Wenbo Shi, Hong Lei, Han Liu, Bangdao Chen:
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection. IEEE Trans. Netw. Serv. Manag. 19(4): 3764-3780 (2022) - [c15]Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. ACSAC 2022: 117-131 - [c14]Han Liu, Huafeng Zhang, Bangdao Chen, A. W. Roscoe:
Committable: A Decentralised and Trustless Open-Source Protocol. ICBC 2022: 1-2 - [i2]Qian Ren, Yingjun Wu, Yue Li, Han Liu, Hong Lei, Lei Wang, Bangdao Chen:
TENET: Towards Self-sovereign and Fair Multi-party Computation Ecology Empowered by Decentralized TEE Network. CoRR abs/2202.10206 (2022) - 2021
- [i1]Qian Ren, Han Liu, Yue Li, Hong Lei, Lei Wang, Bangdao Chen:
CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts. CoRR abs/2106.13926 (2021) - 2020
- [j6]Zijian Bao, Qinghao Wang, Wenbo Shi, Lei Wang, Hong Lei, Bangdao Chen:
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues. IEEE Access 8: 170404-170420 (2020) - [c13]Yue Li, Han Liu, Zhiqiang Yang, Qian Ren, Lei Wang, Bangdao Chen:
SafePay on Ethereum: A Framework For Detecting Unfair Payments in Smart Contracts. ICDCS 2020: 1219-1222 - [c12]Zhiqiang Yang, Han Liu, Yue Li, Huixuan Zheng, Lei Wang, Bangdao Chen:
Seraph: enabling cross-platform security analysis for EVM and WASM smart contracts. ICSE (Companion Volume) 2020: 21-24 - [c11]Yue Li, Han Liu, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang, Bangdao Chen:
Protect Your Smart Contract Against Unfair Payment. SRDS 2020: 61-70
2010 – 2019
- 2019
- [j5]Jie Han, Weitao Jiang, Dong Niu, Yiding Li, Yajun Zhang, Biao Lei, Hongzhong Liu, Yongsheng Shi, Bangdao Chen, Lei Yin, Xiaokang Liu, Donglin Peng, Bingheng Lu:
Untethered Soft Actuators by Liquid-Vapor Phase Transition: Remote and Programmable Actuation. Adv. Intell. Syst. 1(8): 1900109 (2019) - [j4]Jie Han, Weitao Jiang, Dong Niu, Yiding Li, Yajun Zhang, Biao Lei, Hongzhong Liu, Yongsheng Shi, Bangdao Chen, Lei Yin, Xiaokang Liu, Donglin Peng, Bingheng Lu:
Untethered Soft Actuators by Liquid-Vapor Phase Transition: Remote and Programmable Actuation. Adv. Intell. Syst. 1(8): 1970080 (2019) - 2018
- [c10]Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:
ReGuard: finding reentrancy bugs in smart contracts. ICSE (Companion Volume) 2018: 65-68 - 2016
- [c9]Qingquan Lai, Bangdao Chen, Chengzhong Xu:
Using Weighted SVM for Identifying User from Gait with Smart Phone. CCBD 2016: 41-45 - 2013
- [j3]Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. IET Inf. Secur. 7(1): 30-38 (2013) - [j2]Bangdao Chen, Long Hoang Nguyen, A. W. Roscoe:
Reverse Authentication in Financial Transactions and Identity Management. Mob. Networks Appl. 18(5): 712-727 (2013) - 2012
- [b1]Bangdao Chen:
Using human interactive security protocols to secure payments. University of Oxford, UK, 2012 - [j1]Xin Huang, Xiao Ma, Bangdao Chen, Andrew Markham, Qinghua Wang, Andrew William Roscoe:
Human Interactive Secure ID Management in Body Sensor Networks. J. Networks 7(9): 1400-1406 (2012) - [c8]Xin Huang, Shangyuan Guo, Bangdao Chen, A. W. Roscoe:
Bootstrapping body sensor networks using human controlled LED-camera channels. ICITST 2012: 433-438 - [c7]Xin Huang, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe:
User interactive Internet of things privacy preserved access control. ICITST 2012: 597-602 - [c6]Bangdao Chen, A. W. Roscoe:
Social Networks for Importing and Exporting Security. Monterey Workshop 2012: 132-147 - 2011
- [c5]Xin Huang, Qinghua Wang, Chen Bangdao, Andrew Markham, Riku Jäntti, A. W. Roscoe:
Body sensor network key distribution using human interactive channels. ISABEL 2011: 143:1-143:5 - [c4]Bangdao Chen, Long Hoang Nguyen, Andrew William Roscoe:
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. Security Protocols Workshop 2011: 115-125 - [c3]Bangdao Chen:
When Context Is Better Than Identity (Transcript of Discussion). Security Protocols Workshop 2011: 126-131 - [c2]Chen Bangdao, A. W. Roscoe:
Mobile Electronic Identity: Securing Payment on Mobile Phones. WISTP 2011: 22-37 - 2010
- [c1]Chen Bangdao, A. W. Roscoe, Ronald Kainda, Long Hoang Nguyen:
The Missing Link: Human Interactive Security Protocols in Mobile Payment. IWSEC (Short Papers) 2010: 94-109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint